Fraud Prevention
Deepfake Scams - Protection From Deepfake Fraud
Fraud Prevention
Deepfake Scams - Protection From Deepfake Fraud
Cybercriminals continue to develop new ways and technologies to gain access to your personal information and hack your accounts. They also exploit human error, vulnerabilities, and trust to commit their crimes. Here we highlight two types of threats, along with best practices to reduce your risk of becoming a victim of cybercrime.
What is deepfake audio?
Deepfake audio (aka voice swapping) uses a machine-learning algorithm to mimic the voice of a real person on the phone or in a video. For example, a cybercriminal can fake the voice of a senior executive to trick employees into believing they’re being talked to by someone in a position of authority and instructed to carry out orders, such as to facilitate a money transfer or share information.
The primary use of deepfake audio/voice swapping is to enhance Business Email Compromise (BEC) in order to falsely authorize payments. In a BEC scam, criminals send an email message that appears to come from a known source making a legitimate request.
Deepfake audio is one of the most advanced new forms of Artificial Intelligence (AI) underpinning cyber-attacks. The attacker creates a voice model by feeding a computer algorithm into data containing voice samples of the mimicked individual, which are often collected from public sources such as speeches, presentations, corporate videos, and interviews. Once a sufficiently robust deepfake audio profile is built, it can be used with specialized text-to-speech software to create scripts for the fake voice to read. These can take considerable time and resources to create, and the most advanced hackers can create a voice profile by incorporating up to 20 minutes of audio.
What can you do about deepfakes?
What is voice phishing (vishing)?
Vishing is the criminal practice of using social engineering over the telephone to gain access to, or trick people into providing, private, personal, or financial information, usually with the promise of financial reward. The cybercriminal makes a phone call or leaves a voice message purporting to be from a reputable company in order to induce individuals to reveal personal information, such as bank details and credit card numbers. Vishing uses the same techniques as in phishing emails but is done over the phone instead.
What can you do about vishing?
These are all methods that can reduce your risk of falling prey to sophisticated cybercriminals, and we encourage you to consult these tips as needed and periodically to refresh your memory.
Related Articles
Business Email Compromise – What You Need To Know Now
Supply chains and cyber security risk - Corporate Cybersecurity News
What is zero trust? Corporate Cybersecurity News – October 2021
Cyber Threat Trends to the Remote Work Landscape - Telecommuting
Get started with a Commercial representative